{"title":"Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale","authors":"Stijn Pletinckx, Kevin Borgolte, T. Fiebig","doi":"10.1145/3460120.3485367","DOIUrl":null,"url":null,"abstract":"Security misconfigurations and neglected updates commonly lead to systems being vulnerable. Especially in the context of websites, we often find pages that were forgotten, that is, they were left online after they served their purpose and never updated thereafter. In this paper, we introduce new methodology to detect such forgotten or orphaned web pages. We combine historic data from the Internet Archive with active measurements to identify pages no longer reachable via a path from the index page, yet stay accessible through their specific URL. We show the efficacy of our approach and the real-world relevance of orphaned web-pages by applying it to a sample of 100,000 domains from the Tranco Top 1M. Leveraging our methodology, we find 1,953 pages on 907 unique domains that are orphaned, some of which are 20 years old. Analyzing their security posture, we find that these pages are significantly ((p < 0.01) using (χ2)) more likely to be vulnerable to cross-site scripting (XSS) and SQL injection (SQLi) vulnerabilities than maintained pages. In fact, orphaned pages are almost ten times as likely to suffer from XSS (19.3%) than maintained pages from a random Internet crawl (2.0%), and maintained pages of websites with some orphans are almost three times as vulnerable (5.9%). Concerning SQLi, maintained pages on websites with some orphans are almost as vulnerable (9.5%) as orphans (10.8%), and both are significantly more likely to be vulnerable than other maintained pages (2.7%). Overall, we see a clear hierarchy: Orphaned pages are the most vulnerable, followed by maintained pages on websites with orphans, with fully maintained sites being least vulnerable. We share an open source implementation of our methodology to enable the reproduction and application of our results in practice.","PeriodicalId":135883,"journal":{"name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3460120.3485367","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Security misconfigurations and neglected updates commonly lead to systems being vulnerable. Especially in the context of websites, we often find pages that were forgotten, that is, they were left online after they served their purpose and never updated thereafter. In this paper, we introduce new methodology to detect such forgotten or orphaned web pages. We combine historic data from the Internet Archive with active measurements to identify pages no longer reachable via a path from the index page, yet stay accessible through their specific URL. We show the efficacy of our approach and the real-world relevance of orphaned web-pages by applying it to a sample of 100,000 domains from the Tranco Top 1M. Leveraging our methodology, we find 1,953 pages on 907 unique domains that are orphaned, some of which are 20 years old. Analyzing their security posture, we find that these pages are significantly ((p < 0.01) using (χ2)) more likely to be vulnerable to cross-site scripting (XSS) and SQL injection (SQLi) vulnerabilities than maintained pages. In fact, orphaned pages are almost ten times as likely to suffer from XSS (19.3%) than maintained pages from a random Internet crawl (2.0%), and maintained pages of websites with some orphans are almost three times as vulnerable (5.9%). Concerning SQLi, maintained pages on websites with some orphans are almost as vulnerable (9.5%) as orphans (10.8%), and both are significantly more likely to be vulnerable than other maintained pages (2.7%). Overall, we see a clear hierarchy: Orphaned pages are the most vulnerable, followed by maintained pages on websites with orphans, with fully maintained sites being least vulnerable. We share an open source implementation of our methodology to enable the reproduction and application of our results in practice.
安全配置错误和忽略更新通常会导致系统易受攻击。特别是在网站的背景下,我们经常会发现被遗忘的页面,即它们在达到目的后被留在网上,此后再也没有更新过。在本文中,我们介绍了一种新的方法来检测这些被遗忘或孤立的网页。我们将Internet Archive的历史数据与活动测量相结合,以识别不再通过索引页的路径可访问的页面,但仍可通过其特定URL访问。我们通过将我们的方法应用于Tranco前100万域名的100,000个样本,展示了我们的方法的有效性和孤儿网页的现实世界相关性。利用我们的方法,我们在907个孤立的唯一域名上发现了1,953个页面,其中一些已经有20年的历史。分析其安全状态,我们发现这些页面比维护页面更容易受到跨站点脚本(XSS)和SQL注入(SQLi)漏洞的攻击(使用(χ2), p < 0.01)。事实上,孤立页面遭受XSS攻击的可能性(19.3%)几乎是随机互联网抓取维护页面遭受XSS攻击的可能性(2.0%)的10倍,而具有一些孤立页面的网站维护页面的脆弱性几乎是其3倍(5.9%)。关于SQLi,在有一些孤儿的网站上维护的页面几乎和孤儿(10.8%)一样容易受到攻击(9.5%),而且两者都比其他维护的页面(2.7%)更容易受到攻击。总的来说,我们看到了一个清晰的层次结构:孤立的页面是最脆弱的,其次是在有孤立页面的网站上维护的页面,而完全维护的网站是最不脆弱的。我们共享我们方法的开源实现,以便在实践中复制和应用我们的结果。